-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreading-list.htm
124 lines (110 loc) · 5.1 KB
/
reading-list.htm
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
<!doctype html>
<head>
<title>Cyber security and tech reading list | MattCASmith</title>
<meta name="description" content="MattCASmith.net is a blog about cyber security, technology, coding, and more." />
<meta name="robots" content="index, follow" />
<meta name="googlebot" content="index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1" />
<meta name="bingbot" content="index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1" />
<link rel="canonical" href="https://mattcasmith.net/" />
<link rel="next" href="https://mattcasmith.net/blog.htm" />
<meta property="og:locale" content="en_GB" />
<meta property="og:type" content="website" />
<meta property="og:title" content="Cyber security and tech reading list | MattCASmith" />
<meta property="og:description" content="MattCASmith.net is a blog about cyber security, technology, coding, and more." />
<meta property="og:url" content="https://mattcasmith.net/" />
<meta property="og:site_name" content="MattCASmith" />
<meta name="twitter:card" content="summary_large_image" />
<meta name="twitter:site" content="@mattcasmith" />
<link rel="alternate" type="application/rss+xml" title="MattCASmith » feed" href="/feed.xml" />
</head>
<head>
<style>
html {
display: none;
}
</style>
<title> | MattCASmith</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="shortcut icon" href="/assets/images/favicon.png">
<link rel="stylesheet" href="/assets/css/styles.css">
<link href="https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,700;1,400;1,700&display=swap" rel="stylesheet">
</head>
<body>
<div id="site-container" class="home blog-index">
<div id="header">
<div id="header_left">
<a href="/"><img class="site_logo light" src="/assets/images/mcas_site_logo.png"></a>
<a href="/"><img class="site_logo dark" src="/assets/images/mcas_site_logo_dark.png"></a>
<a href="/"><h2>MattCASmith</h2></a>
</div>
<div id="header_right">
<a target="_blank" href="https://twitter.com/mattcasmith"><img class="link_icon_twitter" src="/assets/images/twitter_icon.png"></a>
<a target="_blank" href="mailto:[email protected]"><img class="link_icon_email light" src="/assets/images/email_icon.png"></a>
<a target="_blank" href="mailto:[email protected]"><img class="link_icon_email dark" src="/assets/images/email_icon_dark.png"></a>
</div>
</div>
<div id="home_posts_list">
<div id="blog-index-pinned">
<div class="home_content_box_title">
<div class="home_content_box_title_left reading-list">
<h2>Reading list</h2>
</div>
<div class="home_content_box_title_right reading-list">
<a href="/blog-index.htm">
<div class="home_content_box_button">
Blog index
</div>
</a>
<a href="/blog.htm">
<div class="home_content_box_button">
All posts
</div>
</a>
</div>
</div>
</div>
<div id="blog-index-cols" class="reading-list">
<div class="blog-index-col">
<h2 class="green-title">Cyber security</h2>
<h2>Journalism and memoirs</h2>
<ul>
<li><b>American Kingpin</b><br />by Nick Bilton</li>
<a href="/2020/12/22/best-cyber-security-tech-books-2020"><li><b>Countdown to Zero Day</b><br />by Kim Zetter</li></a>
<li><b>The Cuckoo's Egg</b><br />by Cliff Stoll</li>
<a href="/2020/12/22/best-cyber-security-tech-books-2020"><li><b>Ghost in the Wires</b><br />by Kevin Mitnick</li></a>
<li><b>Kingdom of Lies</b><br />by Kate Fazzini</li>
<li><b>Sandworm</b><br />by Andy Greenberg</li>
</ul>
<h2>Technical</h2>
<ul>
<a href="/2020/12/22/best-cyber-security-tech-books-2020"><li><b>Practical Packet Analysis</b><br/>by Chris Sanders</li></a>
<li><b>The Practice of Network Security Monitoring</b><br />by Richard Bejtlich</li>
<a href="/2018/11/03/threat-modelling-designing-for-security-review/"><li><b>Threat Modeling: Designing for Security</b><br/>by Adam Shostack</li></a>
</ul>
<h2>Miscellaneous</h2>
<ul>
<a href="/2018/08/10/review-infosec-rock-star-ted-demopoulos/"><li><b>InfoSec Rock Star</b><br/>by Ted Demopoulos</li></a>
</ul>
</div>
<div class="blog-index-col">
<h2 class="green-title">Technology</h2>
<h2>Journalism and memoirs</h2>
<ul>
<a href="/2020/12/22/best-cyber-security-tech-books-2020"><li><b>Chaos Monkeys</b><br />by Antonio Garcia Martinez</li></a>
</ul>
<h2>Technical</h2>
<ul>
<a href="/2020/12/22/best-cyber-security-tech-books-2020"><li><b>Code</b><br />by Charles Petzold</li></a>
<li><b>PowerShell for Sysadmins</b><br/>by Adam Bertram</li>
</ul>
</div>
</div>
<div id="footer">
© 2016-24 MattCASmith
<span class="home-link">Personal blog - does not reflect views of employers past or present</span>
</div>
<script data-goatcounter="https://mattcasmith.goatcounter.com/count"
async src="//gc.zgo.at/count.js"></script>
</div>
</body>
</html>